WO2010075077A1 - Systèmes et procédés pour authentifier une identité d'un utilisateur d'une carte de transaction - Google Patents
Systèmes et procédés pour authentifier une identité d'un utilisateur d'une carte de transaction Download PDFInfo
- Publication number
- WO2010075077A1 WO2010075077A1 PCT/US2009/068036 US2009068036W WO2010075077A1 WO 2010075077 A1 WO2010075077 A1 WO 2010075077A1 US 2009068036 W US2009068036 W US 2009068036W WO 2010075077 A1 WO2010075077 A1 WO 2010075077A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- authentication message
- computer
- identity
- transaction
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 47
- 230000004044 response Effects 0.000 claims abstract description 10
- 230000008569 process Effects 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000013475 authorization Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000001737 promoting effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000012011 method of payment Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 239000011800 void material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Definitions
- This invention relates generally to systems and methods for authenticating an identity of a user of a financial transaction card and, more particularly, to network-based systems and methods for authenticating an identity of a user of a financial transaction card when the user is attempting to register with a program offered by a network interchange by generating an authentication message that is accessed by the user from an issuer of the financial transaction card.
- the other parties involved in facilitating such transactions namely the acquirer bank, the issuer bank, and the financial transaction card network (also known as the network interchange or the interchange) generally do not require the legitimate cardholder to pay for such fraudulent transactions. Such a requirement will likely result in the loss of goodwill and perhaps the loss of the legitimate cardholder as a customer. However, the fraudulent transactions are a loss to one or more of these entities. As a result, companies have tried to find an effective way to ensure the security of transactions, especially those in which the financial transaction card is not present, and to decrease the risk of theft or misuse of financial information.
- a system and method is needed that provides additional security for authenticating an identity of a user of a financial transaction card, particularly in the cases when the financial transaction card is not present for a transaction, including when the user is attempting to register online or telephonically with a program offered by the network interchange.
- a method for authenticating an identity of a user of a transaction card as a legitimate cardholder uses an input device communicatively coupled to a computer that is communicatively coupled to a memory for storing information.
- the method includes receiving at the computer a registration request from the user using the input device wherein the registration request includes at least one of an account number and a name associated with the transaction card, generating an authentication message in response to the registration request, transmitting the authentication message to an issuer of the transaction card wherein the issuer provides the authentication message to the user, and receiving at the computer the authentication message from the user entering the authentication message into the input device to authenticate the identity of the user as the legitimate cardholder.
- a computer for authenticating an identity of a user of a transaction card as a legitimate cardholder is provided.
- the computer is communicatively coupled to a memory and an input device.
- the computer is configured to receive a registration request from the user using the input device wherein the registration request includes at least one of an account number and a name associated with the transaction card, generate an authentication message in response to the registration request, transmit the authentication message to an issuer of the transaction card wherein the issuer provides the authentication message to the user, and receive the authentication message from the user entering the authentication message into the input device to authenticate the identity of the user as the legitimate cardholder.
- a system for authenticating an identity of a user of a transaction card as a legitimate cardholder includes an input device associated with the user, an issuer computer system associated with an issuer of the transaction card, and an interchange computer system associated with a network interchange.
- the interchange computer system is communicatively coupled to a memory, the input device, and the issuer computer system.
- the interchange computer system is configured to receive a registration request from the user using the input device wherein the registration request includes at least one of an account number and a name associated with the transaction card, generate an authentication message in response to the registration request, transmit the authentication message to an issuer of the transaction card wherein the issuer provides the authentication message to the user, and receive the authentication message from the user entering the authentication message into the input device to authenticate the identity of the user as the legitimate cardholder.
- a computer program embodied on a computer-readable medium for authenticating an identity of a user of a transaction card as a legitimate holder is provided.
- the user using an input device communicatively coupled to a computer.
- the computer configured to store and process the computer program.
- the computer program comprising at least one code segment that receives a registration request from the user using the input device wherein the registration request includes at least one of an account number and a name associated with the transaction card, generates an authentication message in response to the registration request, transmits the authentication message to an issuer of the transaction card wherein the issuer provides the authentication message to the user, and receives the authentication message from the user entering the authentication message into the input device to authenticate the identity of the user as the legitimate cardholder.
- Figure 1 is a schematic diagram illustrating a known multiparty payment card industry system for enabling ordinary payment-by-card transactions in which the merchants and issuer do not need to have a one-to-one special relationship.
- Figure 2 is a simplified block diagram of a typical server architecture of a system that facilitates authenticating an identity of a customer in accordance with the present invention.
- Figure 3 is an expanded block diagram of the typical system shown in Figure 2 in accordance with the present invention.
- Figure 4 is a flowchart illustrating a first portion of an exemplary process for authenticating an identity of a user of a transaction card that can be utilized by the system shown in Figure 2 in accordance with the present invention.
- Figure 5 is a flowchart illustrating a second portion of the exemplary process shown in Figure 4.
- the methods and systems described herein relate to a financial transaction card payment system, such as a credit card payment system using the MasterCard® interchange (MasterCard is a registered trademark of MasterCard International Incorporated located in Purchase, New York).
- the MasterCard® interchange is a proprietary communications standard promulgated by MasterCard International Incorporated® for the exchange of financial transaction data between financial institutions that have registered with MasterCard International Incorporated®.
- the embodiments described herein are directed to systems and methods for authenticating an identity of a user of a financial transaction card, such as a credit card, debit card, membership card, promotional card, frequent flyer card, identification card, prepaid card, gift card, and/or any other devices that may hold payment account information, such as mobile phones, personal digital assistants (PDAs), and key fobs.
- a financial transaction card such as a credit card, debit card, membership card, promotional card, frequent flyer card, identification card, prepaid card, gift card, and/or any other devices that may hold payment account information, such as mobile phones, personal digital assistants (PDAs), and key fobs.
- PDAs personal digital assistants
- Such cards and/or devices are referred to herein as "a card” or "cards.” These cards can all be used as a method of payment for performing a transaction.
- a transaction card franchiser, transaction card provider, bank, and/or credit union may capture and store transaction data for account holders.
- the transaction data for each transaction may include
- the systems and methods authenticate an identity of a user of a card, when the user is attempting to register with a program offered by a network interchange, by generating an authentication message that is accessed by the user from an issuer of the card.
- the system described herein includes an interchange computer system associated with the network interchange that processes the transaction data related to the card, and an issuer computer system associated with the issuer of the card.
- the user When a user attempts to register with a program being offered by the network interchange, the user typically accesses the interchange computer system either through a remote computer system or by telephone. After inputting an account number or other identifying data, the user must then authenticate his or her identity to the interchange computer system.
- the authentication is performed by the interchange computer system generating an authentication message which is transmitted to the issuer computer system.
- the legitimate cardholder While a person who possesses a physical card or its corresponding account numbers may not be the legitimate cardholder, the legitimate cardholder will typically receive a paper billing statement via mail or have access to an electronic version of the billing statement by accessing the issuer computer system.
- the legitimate cardholder typically must satisfy at least one of several security features using a remote computer or telephone, including, but not limited to, providing a password or PIN, selecting an authentication image or sound, and an interactive voice response system.
- a remote computer or telephone including, but not limited to, providing a password or PIN, selecting an authentication image or sound, and an interactive voice response system.
- the user After obtaining the authentication message from the issuer, the user then transmits or provides the authentication message to the interchange computer system so that the interchange computer system can complete the authentication of the identity of the user, confirming that the user is the true cardholder of the card. The user can then complete registering with the program being offered by the network interchange. [0021] If it is determined that a person attempting to register with a program offered by the network interchange does not appear to be the legitimate cardholder of the card, the systems and methods described herein will notify the network interchange (e.g., MasterCard®) or the issuer (or its agent) of the card so that the person and incident can be investigated further.
- the network interchange e.g., MasterCard®
- the issuer or its agent
- a technical effect of the systems and methods described herein include at least one of (a) providing a card issued by an issuer to a cardholder, wherein transactions involving the card are processed over a network interchange; (b) providing an issuer computer system that is associated with the issuer; (c) providing an interchange computer system that is associated with the network interchange; (d) receiving a registration request, including cardholder data, from a user for a program being offered through the interchange computer system, wherein the cardholder data includes at least one of an account number, a name, or other information used to identify the cardholder, and wherein the user accesses the interchange computer system via a remote input device, including a computer, a telephone, or other device capable of communicating with the interchange computer system; (e) generating a transaction against the account at the interchange computer system for authenticating the identity of the user, wherein transaction data includes an authentication message; (f) storing the authentication message within a database communicatively coupled to the interchange computer system; (g) transmitting the authentication message from the interchange computer system
- a computer program is provided, and the program is embodied on a computer readable medium and utilizes a Structured Query Language (SQL) with a client user interface front-end for administration and a web interface for standard user input and reports.
- SQL Structured Query Language
- the system is web enabled and is run on a business-entity intranet.
- the system is fully accessed by individuals having an authorized access outside the firewall of the business-entity through the Internet.
- the system is being run in a Windows® environment (Windows is a registered trademark of Microsoft Corporation, Redmond, Washington).
- the system is run on a mainframe environment and a UNIX® server environment (UNIX is a registered trademark of AT&T, New York, New York).
- the application is flexible and designed to run in various different environments without compromising any major functionality.
- FIG. 1 illustrates a known multi-party payment card industry system 20 for enabling ordinary payment-by-card transactions in which a merchant 24 and an issuer 30 do not need to have a one-to-one special relationship.
- a financial institution 30 called the "issuer” provides a card, such as a credit card, to a cardholder 22, who uses the card to tender payment for a purchase from a merchant 24.
- merchant 24 To accept payment with the card, merchant 24 must normally establish an account with a financial institution 26 called the "merchant bank,” "acquiring bank,” or "acquirer bank.”
- merchant 24 requests authorization from merchant bank 26 for the amount of the purchase.
- the request may be performed over the telephone, but is usually performed through the use of a point-of-sale terminal, which reads the cardholder's account information from the magnetic stripe or chip on the card and communicates electronically with the transaction processing computers of merchant bank 26.
- merchant bank 26 may authorize a third party called a "merchant processor," an "acquiring processor,” or a "third party processor” to perform transaction processing on its behalf.
- the point-of-sale terminal will be configured to communicate with the third party.
- the computers of merchant bank 26 communicate with the computers of issuer bank 30 to determine whether a cardholder's account 32 is in good standing and whether the purchase is covered by the consumer's available credit line. Based on these determinations, the request for authorization will be declined or accepted. If the request is accepted, an authorization code is issued to merchant 24 and an available credit line of cardholder's account 32 is decreased.
- a charge for a credit transaction is not posted immediately to cardholder's account 32 because bankcard associations, such as MasterCard International Incorporated®, have promulgated rules that do not allow merchant 24 to charge, or "capture,” a transaction until goods are shipped or services are delivered. However, with respect to at least some debit card transactions, a charge may be posted at the time of the transaction.
- merchant 24 ships or delivers the goods or services
- merchant 24 captures the transaction by, for example, appropriate data entry procedures on the point-of-sale terminal. This may include bundling of approved transactions daily for standard retail purchases. If cardholder 22 cancels a transaction before it is captured, a "void” is generated. If cardholder 22 returns goods after the transaction has been captured, a "credit” is generated.
- a transaction After a transaction is captured, the transaction is settled between merchant 24, merchant bank 26, network interchange 28, and issuer 30. Settlement refers to the transfer of financial data or funds between merchant 24, merchant bank 26, network interchange 28, and issuer 30 related to the transaction. Usually, transactions are captured and accumulated into a "batch,” which are settled as a group. More specifically, a transaction is typically settled between issuer 30 and network interchange 28, and then between network interchange 28 and merchant bank 26, and then between merchant bank 26 and merchant 24.
- FIG. 2 is a simplified block diagram of an exemplary system 100 in accordance with one embodiment of the present invention.
- system 100 facilitates ensuring that a person attempting to use a card or its corresponding account numbers is the legitimate cardholder. More specifically, in the exemplary embodiment, system 100 includes a server system 112 communicatively coupled to a plurality of client systems 113 and 114, also known as input devices.
- client systems 113 are computers that include a web browser, which enable client systems 113 to access server system 112 using the Internet. More specifically, client systems 113 are communicatively coupled to the Internet through many interfaces including, but not limited to, at least one of a network, such as a local area network (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dial-up- connection, a digital subscriber line (DSL), and a cable modem.
- Client systems 113 can be any device capable of accessing the Internet including, but not limited to, a desktop computer, a laptop computer, a personal digital assistant (PDA), or other web-based connectable equipment.
- PDA personal digital assistant
- client system 114 is a telephone that is capable of accessing server system 112 over a telephone or a cellular telephone network.
- client system 114 is communicatively coupled to server system 112 via interactive voice recognition (IVR) system 115.
- IVR interactive voice recognition
- client system 114 is communicatively coupled to server system 112 via an operator.
- client system 114 is communicatively coupled directly to server system 112.
- Client system 114 can be any device capable of communicating with server system 112 including, but not limited to, an analog, a digital, a single-line, a multiple-line, a Voice-over- Internet Protocol (VOIP), and a Tl telephone.
- VOIP Voice-over- Internet Protocol
- a database server 116 is communicatively coupled to a database 120 that contains a variety of information including, but not limited to, a name of a cardholder, an account number, a transaction history, and other cardholder- related information.
- database 120 is stored remotely from server system 112.
- database 120 is decentralized.
- a person can access database 120 via client systems 113 and 114 by logging onto server system 112.
- server system 112 may be associated with a network interchange, and may be referred to as an interchange computer system. Server system 112 may be used for processing transaction data and for registering cardholders into a plurality of programs offered by the network interchange.
- client systems 113, 114 may include a computer system associated with an issuer of a transaction card. Accordingly, server system 112 and client systems 113, 114 may be utilized to process transaction data relating to purchases made by a cardholder utilizing a transaction card that is processed by the network interchange and issued by the associated issuer.
- Another client system 113, 114 may be associated with a user or a cardholder seeking to register, access information or process a transaction with at least one of the network interchange or the issuer.
- the embodiments illustrated and described herein as well as embodiments not specifically described herein but within the scope of aspects of the invention constitute exemplary means for authenticating an identity of a user of a financial transaction card, and more particularly, constitute exemplary means for authenticating an identity of a user of a financial transaction card when the user is attempting to register with a program offered by a network interchange by generating an authentication message that is accessed by the user from an issuer of the financial transaction card.
- the server system 112 or the client system 113, 114, or any other similar computer device programmed with computer-executable instructions to execute processes and techniques with a processor as described herein, constitutes exemplary means for authenticating an identity of a user of a financial transaction card.
- Figure 3 is an expanded block diagram of an exemplary system 122 in accordance with one embodiment of the present invention.
- the components of system 122 which are identical to components of system 100 (shown in Figure 2), are identified in Figure 3 using the same reference numerals as used in Figure 2.
- system 122 includes server system 112 and client systems 113 and 114.
- Server system 112 includes database server 116 and further includes an application server 124, a web server 126, a fax server 128, a directory server 130, and a mail server 132.
- a disk storage unit 134 is communicatively coupled to database server 116 and directory server 130.
- servers 116, 124, 126, 128, 130, and 132 are communicatively coupled to a LAN 136 and/or a WAN 150.
- Server system 112 is also communicatively coupled to IVR unit 115.
- a system administrator workstation 138, a user workstation 140, an employee workstation 144, and a manager workstation 156 are communicatively coupled to LAN 136 and/or WAN 150.
- workstations 138, 140, 144, and 156 are communicatively coupled to LAN 136 and/or WAN 150 through the Internet or an intranet.
- the functions performed at workstations 138, 140, 144, and 146 are illustrated as being associated with separate functions, such functions can be performed at any computer or workstation communicatively coupled to LAN 136 and/or WAN 150.
- Workstations 138, 140, 144, and 146 are illustrated as being associated with separate functions only to facilitate an understanding of the different types of functions that can be performed by persons having access to LAN 136 and/or WAN 150.
- workstations 138, 140, 144, and 156 can be telephone client system 114 communicatively coupled to server system 112.
- server system 112 is communicatively coupled to third parties 146, e.g., auditors, using an ISP Internet connection 148.
- third parties 146 e.g., auditors
- any network communication such as LAN 136 and/or WAN 150, can communicatively couple third parties 146 to server system 112.
- any authorized individual having third party workstation 146 can access server system 112, including employees and managers.
- FIG 4 is a flowchart 260 illustrating a first portion of an exemplary process for authenticating an identity of a user of a transaction card.
- flowchart 260 illustrates a first portion of one exemplary process that can be implemented by system 100 (shown in Figure 2).
- the first portion of the process described in flowchart 260 relates to the generation of an authentication message by server system 112, wherein the authentication message is generated on behalf of the network interchange.
- the process begins when the user attempts to register a card for a program, and computer system 112 receives 262 a registration request from the user.
- the user uses a remote input device, such as client system 113 or 114, to provide cardholder data, such as an account number, cardholder name, etc., to the network interchange including computer system 112.
- Exemplary programs may include at least one of an express checkout program, an electronic wallet program, a rewards program, or a merchant sales program.
- a user may wish to enroll in a promotional program that provides a discount to a cardholder shopping at a particular vendor with a particular card.
- the user is an existing cardholder with an active account with a card company.
- server system 112 upon receiving the registration request, server system 112 generates 264 an authentication message for the account associated with the account number provided by the user.
- the authentication message is generated by the network interchange, and is generated in a manner that is similar to a typical transaction that is charged to the account associated with the account number provided by the user. This transaction charged to the account could include at least one of a nominal amount (a few cents) debited or credited to the account, and a no charge amount issued to the account.
- the authentication message generated 264 by server system 112 is communicated, either in a transaction format or in some other format, to the issuer such that the authentication message can be utilized to authenticate the identity of the user.
- Server system 112 stores 266 the transaction data within database 120 (shown in Figure 2).
- the transaction data includes the authentication message along with various transaction-related information including, but not limited to, a merchant name and a transaction amount.
- the authentication message can be stored in any field as long as the legitimate cardholder would have reasonable access to it. For example, a legitimate cardholder would have reasonable access to any information that is published in a billing statement, such as a merchant name and a transaction amount.
- an authentication message "123456" is stored in a merchant name field that recites "Express Checkout - 123456". In such an embodiment, "Express Checkout” refers to the program in which the user wishes to enroll and "123456" refers to the authentication message.
- a numeric authentication message facilitates entering the authentication message into a telephone, such as client system 114.
- client system 114 any alphanumeric, visual, or audial authentication message that may reasonably be entered into client system 113 or 114 may be used to facilitate authenticating an identity of a user.
- server system 112 transmits 268 the transaction data including the authentication message to an issuer computer system 114 to enable the authentication message to be provided to the legitimate cardholder.
- the authentication message is provided to the issuer so that it can be included within a billing statement associated with the account number provided by the user.
- the billing statement can be either a paper document that may be sent via mail to the legitimate cardholder or an electronic document that may be available online or sent via email.
- FIG. 5 is a flowchart 270 illustrating a second portion of the exemplary process shown in Figure 4.
- Flowchart 270 is the second portion of the process shown in Figure 4 for authenticating an identity of a user of a transaction card.
- the process shown in flowchart 270 is implemented by system 100 (shown in Figure 2).
- flowchart 270 continues the process shown in flowchart 260 (shown in Figure 4), and the user uses client system 113 or 114 to finalize registration by providing the authentication message to server system 112.
- server system 112 which is associated with the network interchange, prompts 272 the user to obtain the authentication message from the issuer's billing statement and input the authentication message into client system 113 or 114 to authenticate the identity of the user.
- client system 113 is a computer system associated with the issuer of the transaction card.
- Client system 113 includes additional security measures that the user must satisfy in order to gain access to the electronic billing statement.
- additional security measures may include, but are not limited to a password, a PIN or an authentication image or sound.
- the user can use a remote computer system to access the billing statement through the issuer's computer system.
- the user would have to overcome or satisfy any security measures the issuer already has in place such that the user can view the billing statement.
- server system 112 receives 274 an inputted authentication message from client system 113 or 114, system 112 compares 276 the inputted authentication message with the stored authentication message associated with the account. In the exemplary embodiment, if the inputted authentication message matches the stored authentication message, system 112 authenticates 278 the identity of the user as the legitimate cardholder. The user can then continue to register the account for the program through the interchange computer.
- the card company stores, for program registration purposes, customer information within a database including a customer name, an account number, and other identifying information. If, however, the inputted message does not match the stored authentication message, system 112 does not register the account with the program.
- Flowcharts 260 and 270 may also be used for risk-based authentication or reauthentication purposes.
- a transaction is performed by a legitimate cardholder, such as a transaction from a remote input device with a new Internet Protocol (IP) address, a transaction from a foreign country, a transaction that is relatively large, or an increase in the frequency of transactions.
- IP Internet Protocol
- the systems and methods described herein may be employed to authenticate or reauthenticate a user of a transaction card, particularly in the case of a card not present transaction, so that at least one of the network interchange and the issuer can be confident that the user is the legitimate cardholder.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
L'invention concerne un dispositif d'entrée associé à un utilisateur et un système informatique d'émetteur associé à un émetteur qui sont couplés à un système informatique d'échange associé à un échange de réseau. Le système informatique d'échange est conçu pour authentifier une identité d'un utilisateur d'une carte de transaction en tant que porteur de carte légitime. Plus spécifiquement, le système informatique d'échange est conçu pour recevoir une demande d'enregistrement provenant de l'utilisateur qui utilise le dispositif d'entrée, la demande d'enregistrement comprenant un numéro de compte ou un nom associé à la carte de transaction, pour générer un message d'authentification en réponse à la demande d'enregistrement, pour transmettre le message d'authentification à un émetteur de la carte de transaction, l'émetteur fournissant le message d'authentification à l'utilisateur, et pour recevoir le message d'authentification provenant de l'utilisateur entrant le message d'authentification dans le dispositif d'entrée afin d'authentifier l'identité de l'utilisateur en tant que porteur de carte légitime.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/343,837 US11372954B2 (en) | 2008-12-24 | 2008-12-24 | Systems and methods for authenticating an identity of a user of a transaction card |
US12/343,837 | 2008-12-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010075077A1 true WO2010075077A1 (fr) | 2010-07-01 |
Family
ID=42267463
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2009/068036 WO2010075077A1 (fr) | 2008-12-24 | 2009-12-15 | Systèmes et procédés pour authentifier une identité d'un utilisateur d'une carte de transaction |
Country Status (2)
Country | Link |
---|---|
US (1) | US11372954B2 (fr) |
WO (1) | WO2010075077A1 (fr) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180053157A1 (en) * | 2010-01-08 | 2018-02-22 | Blackhawk Network, Inc. | Systems and methods for consumer modifiable payment card transactions |
FR2985341B1 (fr) * | 2011-12-30 | 2015-01-09 | Pw Group | Procede et systeme de securisation d'un paiement realise a l'aide d'une carte de paiement |
US10521794B2 (en) * | 2012-12-10 | 2019-12-31 | Visa International Service Association | Authenticating remote transactions using a mobile device |
US9424410B2 (en) | 2013-12-09 | 2016-08-23 | Mastercard International Incorporated | Methods and systems for leveraging transaction data to dynamically authenticate a user |
US9928358B2 (en) * | 2013-12-09 | 2018-03-27 | Mastercard International Incorporated | Methods and systems for using transaction data to authenticate a user of a computing device |
US11037139B1 (en) | 2015-03-19 | 2021-06-15 | Wells Fargo Bank, N.A. | Systems and methods for smart card mobile device authentication |
WO2017035460A1 (fr) * | 2015-08-27 | 2017-03-02 | Mastercard International Incorporated | Systèmes et procédés pour surveiller des procédures d'authentification informatique |
US11113688B1 (en) | 2016-04-22 | 2021-09-07 | Wells Fargo Bank, N.A. | Systems and methods for mobile wallet provisioning |
CN110223073A (zh) * | 2019-04-24 | 2019-09-10 | 阿里巴巴集团控股有限公司 | 支付身份核验方法及装置 |
US11941608B1 (en) | 2019-09-18 | 2024-03-26 | Wells Fargo Bank, N.A. | Systems and methods for a transaction card having a customer-specific URL |
US11423392B1 (en) | 2020-12-01 | 2022-08-23 | Wells Fargo Bank, N.A. | Systems and methods for information verification using a contactless card |
US11558370B2 (en) * | 2021-06-14 | 2023-01-17 | Bank Of America Corporation | Electronic system for generation of authentication tokens using digital footprint |
US20240297788A1 (en) * | 2023-03-02 | 2024-09-05 | Bank Of America Corporation | Systems and methods for real-time permissioning for digital resources in a distributed computing system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020091646A1 (en) * | 2000-11-03 | 2002-07-11 | Lake Lawrence L. | Method and system for verifying the identity of on-line credit card purchasers through a proxy transaction |
US20030200184A1 (en) * | 2002-04-17 | 2003-10-23 | Visa International Service Association | Mobile account authentication service |
US20040019564A1 (en) * | 2002-07-26 | 2004-01-29 | Scott Goldthwaite | System and method for payment transaction authentication |
US20050075985A1 (en) * | 2003-10-03 | 2005-04-07 | Brian Cartmell | Voice authenticated credit card purchase verification |
US20080301056A1 (en) * | 2000-04-24 | 2008-12-04 | Weller Kevin D | Online payer authentication service |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7430521B2 (en) * | 1997-08-28 | 2008-09-30 | Walker Digital, Llc | System and method for managing customized reward offers |
US20020169664A1 (en) * | 1997-12-01 | 2002-11-14 | Walker Jay S. | System for providing offers using a billing statement |
US7379919B2 (en) | 2000-04-11 | 2008-05-27 | Mastercard International Incorporated | Method and system for conducting secure payments over a computer network |
US6990470B2 (en) | 2000-04-11 | 2006-01-24 | Mastercard International Incorporated | Method and system for conducting secure payments over a computer network |
AU8348901A (en) | 2000-07-10 | 2002-01-21 | Mastercard International Inc | Method and system for conducting secure electronic commerce transactions with authorization request data loop-back |
US6915279B2 (en) | 2001-03-09 | 2005-07-05 | Mastercard International Incorporated | System and method for conducting secure payment transactions |
US7292999B2 (en) | 2001-03-15 | 2007-11-06 | American Express Travel Related Services Company, Inc. | Online card present transaction |
US10134202B2 (en) | 2004-11-17 | 2018-11-20 | Paypal, Inc. | Automatic address validation |
US20070145121A1 (en) | 2005-12-23 | 2007-06-28 | Menashe Fouad Dallal | Authentication system for the authorization of a transaction using a credit card, ATM card, or secured personal ID card |
US7917402B2 (en) * | 2006-03-15 | 2011-03-29 | Gofiniti, Llc | Methods for viral marketing with visual communications |
JP2009245289A (ja) * | 2008-03-31 | 2009-10-22 | Hitachi Ltd | コンテンツ提供システム及びコンテンツ提供方法 |
US20100106570A1 (en) * | 2008-10-28 | 2010-04-29 | Cristian Radu | Systems and methods for enrollment and participation in a loyalty program |
US8473361B2 (en) * | 2010-09-23 | 2013-06-25 | Billeo, Inc. | Method and system for assisting users during online |
-
2008
- 2008-12-24 US US12/343,837 patent/US11372954B2/en active Active
-
2009
- 2009-12-15 WO PCT/US2009/068036 patent/WO2010075077A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080301056A1 (en) * | 2000-04-24 | 2008-12-04 | Weller Kevin D | Online payer authentication service |
US20020091646A1 (en) * | 2000-11-03 | 2002-07-11 | Lake Lawrence L. | Method and system for verifying the identity of on-line credit card purchasers through a proxy transaction |
US20030200184A1 (en) * | 2002-04-17 | 2003-10-23 | Visa International Service Association | Mobile account authentication service |
US20040019564A1 (en) * | 2002-07-26 | 2004-01-29 | Scott Goldthwaite | System and method for payment transaction authentication |
US20050075985A1 (en) * | 2003-10-03 | 2005-04-07 | Brian Cartmell | Voice authenticated credit card purchase verification |
Also Published As
Publication number | Publication date |
---|---|
US20100161470A1 (en) | 2010-06-24 |
US11372954B2 (en) | 2022-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11372954B2 (en) | Systems and methods for authenticating an identity of a user of a transaction card | |
US8086534B2 (en) | Methods and systems for cardholder initiated transactions | |
US8261977B2 (en) | Methods and systems for using an interface and protocol extensions to perform a financial transaction | |
US8317090B2 (en) | Methods and systems for performing a financial transaction | |
US20180240115A1 (en) | Methods and systems for payments assurance | |
US9679293B1 (en) | Systems and methods for multifactor authentication | |
US8271392B2 (en) | Methods and systems for managing merchant screening | |
US8095438B2 (en) | Methods and systems for assigning interchange rates to financial transactions using an interchange network | |
US8448229B2 (en) | Methods and systems for providing website hosting security | |
US20070005467A1 (en) | System and method for carrying out a financial transaction | |
US20070174186A1 (en) | Authenticated and distributed transaction processing | |
US20010023409A1 (en) | Apparatus for establishing debit accounts | |
US20140207656A1 (en) | Disposable payment account | |
US11379807B2 (en) | Methods and systems for initiating a financial transaction by a cardholder device | |
US20090171794A1 (en) | Systems and methods for processing a payment transaction | |
WO2000075749A2 (fr) | Systeme de paiement sur internet | |
US20090132425A1 (en) | Methods and systems for financial transaction card security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09835580 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09835580 Country of ref document: EP Kind code of ref document: A1 |